Dreamer

HTB Sorcery Writeup

Comprehensive enumeration and exploitation walkthrough of the Sorcery HTB machine, including Nmap analysis, Docker architecture, Cypher injection, Kafka RCE, phishing, and privilege escalation techniques.